Skip to main content

Netskope Help

Configure Single Sign On for the Netskope UI

The Netskope platform supports local and the SAML SP (Service Provider) workflows to provide authentication and authorization. This allows for two-factor authorization supported by the IdP and eliminates the need to create local accounts for admins on the Netskope UI with the exemption of a tenant admin in case Single Sign On (SSO) is not available.

To set up SSO in the Netskope UI, go to Settings > Administration > SSO.

SSO Settings

There are two sets of SSO setting configurations:

  • Netskope Configuration entered at the IdP (SSO Vendor)

    Note

    If you disable or migrate the SSO vendor, remove the SSO configuration and Netskope application from your SSO vendor dashboard.

  • IdP-related configuration entered in Netskope admin UI

Netskope Configuration at the IdP (SSO Vendor)

There are two parameters:

  • ACS (Assertion Consumer Service) URL: This is the URL the IdP sends the assertion to after authenticating the user.

  • entityId: Your unique Netskope tenant ID.

These configuration parameters can be obtained from the tenant UI by going to Setting > Administration > SSO.

SSOnetskopeSettings.png
IdP-related Configuration in the Netskope Admin UI

Obtain these from your SSO vendor:

  • IdP Single Sign-On URL

  • IdP Entity ID

  • X.509 Certificate (IdP Public Key)

  • IdP Single Log Out (SLO) URL

On the SSO page in the Netskope  UI, click Edit Settings and enter your IdP information. Enter the SLO information and enable SLO in the Edit dialog box.

The "Enable SSO" flag provides you the option to force authentication. When this option is unchecked, users will be required to login to the application.

SSOeditSettings.png

Optionally, select the Sign SSO Authentication Request checkbox to use SSO to sign authentication requests. Download the Netskope SAML certificate and upload it to the IdP to validate Netskope's signed SSO Authentication Requests.

Another option is to Disable Force Authentication. By checking this box, Netskope will not send ForceAuthn request in the SAML Request.

IdP-driven Role Mapping

IdP-driven role mapping is optional. From the IdP/SSO vendor, there's a value admin-role that can be used for authorization info. This field can have the following values:

  • Tenant Admin

  • Delegated Admin

  • Predefined and custom (created) roles.

Tip

Some 3rd-party IdP systems do not accept blank spaces in their role attribute values. A workaround for this is to clone Netskope predefined roles and rename them, omitting any spaces in the new names.

Admin Role Sent by IdP

Check against Local DB

Outcome

Nothing sent

If the user is a provisioned user in the UI, then the admin account type configured for the user will be used to identify the privilege

Return error if no role found

Tenant admin

No

Log in with role Tenant Admin

Delegated admin

No

Log in with role Delegated Admin

Read-only roles

Checked against roles configured in the tenant UI

If role name is found, use that role. If not found, return an error.

Tip

If you need to bypass the SSO, log in to your tenant directly using the URL: https://<tenant name>.goskope.com/locallogin.

Single Logout

Netskope supports single logout. When SSO is configured, a user can be redirected to a specific logout page.

Timeout

Currently if an admin is idle for 15 minutes, the admin is logged out and sent to the login page. If SLO is enabled, we should now send him to the logout page configured under SLO settings.

Verify SSO for the Netskope UI
  1. Enter the tenant login URL (https://<tenant hostname>.goskope.com) into a browser window.

  2. One of two things happen:

    • If SAML has not been configured for this tenant, then the username/password page shows up as it does normally. You'll need to authenticate locally.

    • If SAML has been configured for this tenant, then Netskope will send an SAML AuthnRequest to the IdP. After the IdP authenticates the user, it will send an SAML Assertion back to Netskope with the admin's authentication (email address - NameID) and authorization (admin-role) credentials.

  3. On receiving the assertion, Netskope checks the authorization credentials. If authorization credentials pass they are used. If not, then Netskope tries to get the authorization attributes from our local tables. If local authorization values cannot be found, then Netskope reports an error.